SkillAgentSearch skills...

ConfigStream

ConfigStream collects, deduplicates, tests, and ranks free VPN/proxy configs from hundreds of public sources, then publishes ready-to-use outputs on GitHub Pages. Scheduled runs (GitHub Actions) export Base64 subscriptions, Clash YAML, raw lists, and JSON metadata. Use for casual, non-sensitive browsing.

Install / Use

/learn @AmirrezaFarnamTaheri/ConfigStream
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

ConfigStream

ConfigStream is a sovereignty-grade, zero-budget anti-censorship platform. It continuously aggregates, validates, and distributes resilient proxy configurations under hostile network conditions.

Principles

  • Zero budget: free GitHub Actions/Pages, public APIs, and user-provided resources only
  • Resilience: fail-open or fail-safe handling for timeouts, blocklists, and unreliable sources
  • Security: strict validation and sanitized logging

What It Does

  • Ingests sources (remote URLs or local files) and extracts proxy configs across 20+ protocols
  • Tests and ranks proxies using a dual engine (Go sidecar + Python fallback)
  • Revives failed proxies by wrapping them in WARP or Vwarp chains when possible
  • Builds smart chains for resilient routing
  • Publishes multiple subscription formats and a metadata-rich JSON dataset

Who It Is For

  • End users who want stable, frequently updated subscriptions
  • Operators who need a free, resilient pipeline with zero paid infrastructure
  • Developers who want structured datasets for analytics or custom tooling

Operating Model

Runs on a strict zero-budget design: GitHub Actions executes the pipeline every 4 hours, and GitHub Pages hosts the outputs. The pipeline is stateless between runs, uses adaptive timeouts, and prioritizes safe failure modes under hostile network conditions.

Architecture Overview

ConfigStream uses a streaming producer-consumer pipeline.

  1. Source acquisition Fetch remote URLs or local files with adaptive timeouts and circuit breakers. Decode safely and enqueue raw content.
  2. Parsing and normalization Extract valid config lines from untrusted inputs. Normalize protocol aliases and enforce mandatory fields.
  3. Validation and security Drop malformed or unsafe configs. Sanitize logs and enforce blocklists.
  4. Testing and scoring Test proxies with the Go sidecar or Python fallback. Rank proxies by latency and reliability.
  5. Washing and smart chains Wrap failed proxies with WARP or Vwarp to attempt revival. Generate topology-aware chains for resilient routing.
  6. Output generation Export multiple formats with metadata and stats. Split outputs by format and category.
  7. Publish and cache Write outputs atomically and publish via GitHub Pages.

See docs/wiki/project/02-architecture.md for the full pipeline design and data flow.

Operational Governance

  • Living roadmap process: docs/ROADMAP_UPDATE_PROCESS.md
  • Release hardening and provenance controls: docs/RELEASE_HARDENING_2026.md
  • Finalization status and phase matrix: docs/FINALIZATION_REPORT_2026.md
  • Technical debt registry: docs/DEBT_MATRIX.md

Evasion Features

ConfigStream includes advanced censorship evasion capabilities:

  • TLS Fingerprint Rotation: Mimics browser TLS handshakes (Chrome, Firefox, Safari, iOS)
  • TLS Fragmentation: Splits TLS packets to bypass stateless DPI
  • Multiplexing with Padding: HTTP/2 multiplexing with random padding to hide traffic patterns
  • ALPN Rotation: Varies protocol negotiation to prevent fingerprinting
  • DNS Hardening: DoH/DoT/DoQ resolvers with prefer-IP strategy
  • Shielding (Copper to Gold): Wraps blocked proxies in WARP tunnels
  • Revival: Resurrects failed proxies using WARP or Vwarp chains
  • BYOW (Bring Your Own Worker): Users deploy their own Cloudflare Workers for unlimited, private, unblockable connections

See docs/CENSORSHIP_EVASION.md for technical details, evasion modes, DNS profiles, and user instructions.

Protocols and Formats

Supported protocols include VLESS, VMess, Trojan, Shadowsocks, SSR, Hysteria, Hysteria2, TUIC, WireGuard, OpenVPN, HTTP, SOCKS, SSH, Xray, Snell, Brook, and Juicity. Parsing is resilient against malformed inputs and includes credential recovery for common edge cases.

Export formats include:

  • Sing-box configs
  • Clash YAML
  • Base64 subscriptions
  • Native client packs (OpenVPN and WireGuard)
  • Structured JSON datasets for analytics and tooling

Testing and Ranking

ConfigStream validates reachability and quality with a dual engine and ranks proxies using latency and reliability signals.

  • Go sidecar tester for high-concurrency checks
  • Python fallback tester when the binary is unavailable
  • Cache-aware retesting to avoid redundant checks
  • Evasion-aware testing to identify proxies requiring advanced features

Smart Chains Explained

Smart chains are multi-hop routing paths assembled automatically to improve resilience and bypass DPI or hostile networks. A chain is built from multiple outbounds (for example: entry -> relay -> exit), and the system selects relays using latency, reliability, and geography signals to reduce failure rates and improve stability.

Key points:

  • Built only from proxies that pass validation and testing
  • Prioritizes diverse routes to avoid single points of failure
  • Works alongside WARP or Vwarp washing
  • Exported in singbox-chains.json and tracked in metadata

Terminology

  • Native proxies: validated and tested direct proxies from sources
  • Washed proxies: proxies wrapped through WARP or Vwarp tunnels
  • Revived proxies: previously failing proxies that became usable after washing
  • Smart chains: multi-hop paths built from tested proxies to improve resilience

Outputs (Updated Every 4 Hours)

All outputs are served from GitHub Pages in production. Each run writes outputs atomically and includes a generated_at timestamp in metadata to make freshness explicit.

Primary outputs:

  • singbox.json: smart routing profile
  • singbox-vpn.json: TUN or VPN profile
  • clash.yaml: Clash-compatible
  • base64.txt: universal subscription
  • chosen/base64.txt: curated low-latency subset

Derived outputs:

  • singbox-chains.json: washed + revived + smart + shielded chains
  • revived.json: revived-only dataset (proxies.json schema)
  • proxies.json: full dataset with metadata
  • side_products.zip: native configs pack (OpenVPN .ovpn, WireGuard .conf, raw URIs)
  • protocols/*.txt: per-protocol URI subscription files (e.g. vless.txt, trojan.txt)

Output notes:

  • Base64 and plaintext subscriptions include both native and revived proxy URIs for maximum coverage.
  • JSON datasets expose metadata and stats used by the frontend and external tooling.
  • DNS-safe variants are available for all major outputs with the -dns-safe suffix (IP-only / pre-resolved endpoints). This is a strict subset — proxies that fail resolution are dropped.
  • DNS-hardened variants are available for all major outputs with the -dns-hardened suffix. They embed DoH/DoT/DoQ resolvers and prefer IP when available while keeping unresolved entries intact.

Compatibility Matrix

Use the output that matches your client or use case. This matrix lists every output and its compatible client family.

| Output | Compatible Clients | Notes | | --- | --- | --- | | singbox.json | sing-box (desktop, mobile, server) | Smart routing profile | | singbox-vpn.json | sing-box (TUN/VPN mode) | System-wide VPN profile | | singbox-chains.json | sing-box, Xray, Nekobox | Washed + smart chains only | | clash.yaml | Clash family (Clash, Meta, Verge, etc.) | Clash-compatible format | | base64.txt | Clients that accept base64/URI subscriptions (e.g., common iOS/macOS clients) | Universal base64 subscription | | chosen/base64.txt | Lightweight clients or quick start setups | Smaller curated list | | side_products.zip | OpenVPN and WireGuard clients | .ovpn and .conf files | | protocols/*.txt | Any client accepting URI subscriptions | Per-protocol plaintext URI lists | | proxies.json | Developers and tooling | Full dataset with metadata | | revived.json | Developers and tooling | Revived-only subset |

DNS-safe variants:

  • All primary outputs above have -dns-safe equivalents, for example base64-dns-safe.txt, singbox-dns-safe.json, clash-dns-safe.yaml, shadowrocket-dns-safe.txt, proxies-dns-safe.txt, chains-dns-safe.json, and side_products-dns-safe.zip.
  • These files use IP-literal or pre-resolved endpoints and preserve SNI/Host where possible. They are useful when DNS is blocked or poisoned.
  • DNS-safe outputs may be smaller if resolution fails or if a protocol cannot be safely rewritten.

DNS-hardened variants:

  • All primary outputs have -dns-hardened equivalents: singbox-dns-hardened.json, singbox-vpn-dns-hardened.json, clash-dns-hardened.yaml, base64-dns-hardened.txt, shadowrocket-dns-hardened.txt, surge-dns-hardened.conf, loon-dns-hardened.conf, quantumult-dns-hardened.conf, sip008-dns-hardened.json, chains-dns-hardened.json, side_products-dns-hardened.zip.
  • They keep hostnames but prefer IPs when available, which improves survivability under DNS poisoning without dropping unresolved entries.
  • Sing-box and Clash variants embed DoH/DoT/DoQ resolver configs. Adapter variants (Surge, Loon, QX, Shadowrocket) include resolver comments.

Production subscription links:

  • https://amirrezafarnamtaheri.github.io/ConfigStream/singbox.json
  • https://amirrezafarnamtaheri.github.io/ConfigStream/singbox-vpn.json
  • https://amirrezafarnamtaheri.github.io/ConfigStream/clash.yaml
  • https://amirrezafarnamtaheri.github.io/ConfigStream/base64.txt
  • https://amirrezafarnamtaheri.github.io/ConfigStream/chosen/base64.txt
  • https://amirrezafarnamtaheri.github.io/ConfigStream/singbox-chains.json
  • https://amirrezafarnamtaheri.github.io/ConfigStream/revived.json
  • https://amirrezafarnamtaheri.github.io/ConfigStream/proxies.json
  • https://amirrezafarnamtaheri.github.io/ConfigStream/side_products.zip
  • https://amirrezafarnamtaheri.github.io/ConfigStream/base64-dns-safe.txt
  • https://amirrezafarnamtaheri.github.io/ConfigStream/singbox-dns-safe.json
  • https://amirrezafarnamtaheri.github.io/ConfigStream/clash-dns-safe.yaml
  • https://amirrezafarnamtaheri.github.io/ConfigStream/singbox-dns-hardened.json
  • https://amirrezafarnamtaheri.github.io/ConfigStream/singbox-vpn-dns-hardened.json
  • https://amirrezafarnamtaheri.github.io/ConfigStream/clash-dns-hardened.ya

Related Skills

View on GitHub
GitHub Stars8
CategoryDevelopment
Updated1mo ago
Forks1

Languages

Python

Security Score

85/100

Audited on Mar 1, 2026

No findings